How good personal device policy creates a #CyberSafeBusiness
March 15, 2016
Many employees use their personal devices to do work when they're in the office, at home, travelling, or even in the coffee shop down the street. But not everyone is aware of the cyber security risks they might be carrying throughout their busy lives.
Mobile devices are attractive to thieves. They are easy to steal if left unattended, or if they fall out of a pocket or bag. Confidential or sensitive business data can then be accessed on the device, especially if it is not password-protected.
As well, work-owned devices used outside the office can expose your business to the loss of sensitive information, to malware, and to other threats. Even using public networks on a mobile device, to send and receive business information, can allow your private data to be viewed or used by unauthorized people.
The good news is that there are ways to defend your business's cyber security, while still allowing employees flexibility and mobility.
7 steps for a successful #CyberSafeBusiness policy:
- Examine the pros and cons of mobile device use (phones, tablets) in your business.
- Determine which devices you allow in your business and establish rules on how they can be used by employees.
- Develop a plan for the management of mobile devices. For example, accessing and controlling them remotely, or blocking certain functions.
- Log the serial numbers of all mobile devices used in your business in case of loss or theft.
- Ensure that all mobile business devices have passwords and are locked when not in use.
- Protect your data on mobile devices with security features and anti-malware software.
- Advise employees to report the loss or theft of a business device immediately after it is noticed. Then alert the police, recover the device, or remotely wipe device contents.
Find out more about running a #CyberSafeBusiness in the free Get Cyber Safe Guide for Small and Medium Businesses, available online at GetCyberSafe.ca
There are no comments at this time
- Date modified: